ABSTRACT
Distributed ledger technology offers numerous desirable attributes to applications in the enterprise context. However, with distributed data and decentralized computation on a shared platform, privacy and confidentiality challenges arise. Any design for an enterprise system needs to carefully cater for use case specific privacy and confidentiality needs. With the goal to facilitate the design of enterprise solutions, this paper aims to provide a guide to navigate and aid in decisions around common requirements and mechanisms that prevent the leakage of private and confidential information. To further contextualize key concepts, the design guide is then applied to three enterprise DLT protocols: Hyperledger Fabric, Corda, and Quorum.
- Shawn Amundson. 2019. Hyperledger Proposal for Transaction Execution Platform. https://wiki.hyperledger.org/display/HYP/ Hyperledger+Proposal+for+Transaction+Execution+PlatformGoogle Scholar
- Ittai Anati, Shay Gueron, Simon P Johnson, and Vincent R Scarlata. 2013. Innovative Technology for CPU Based Attestation and Sealing. (2013), 1--7.Google Scholar
- Elli Androulaki, Artem Barger, Vita Bortnikov, Christian Cachin, Konstantinos Christidis, Angelo De Caro, David Enyeart, Christopher Ferris, Gennady Laventman, Yacov Manevich, Srinivasan Muralidharan, Chet Murthy, Binh Nguyen, Manish Sethi, Gari Singh, Keith Smith, Alessandro Sorniotti, Chrysoula Stathakopoulou, Marko Vukolić, Sharon Weed Cocco, and Jason Yellick. 2018. Hyperledger Fabric: A Distributed Operating System for Permissioned Blockchains. (2018). https://doi.org/10.1145/3190508.3190538 arXiv:1801.10228Google Scholar
- Elli Androulaki, Christian Cachin, Angelo De Caro, and Eleftherios Kokoris-Kogias. 2018. Channels: Horizontal Scaling and Confidentiality on Permissioned Blockchains. Springer, Cham, 111--131. https://doi.org/10.1007/978-3-319-99073-6_6Google Scholar
- Arati Baliga, I Subhod, Pandurang Kamat, and Siddhartha Chatterjee. 2018. Performance Evaluation of the Quorum Blockchain Platform. (2018). arXiv:1809.03421 http://arxiv.org/abs/1809.03421Google Scholar
- Marcus Brandenburger, Christian Cachin, Matthias Lorenz, and Rudiger Kapitza. 2017. Rollback and Forking Detection for Trusted Execution Environments Using Lightweight Collective Memory. Proceedings - 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2017 (2017), 157--168. https://doi.org/10.1109/DSN. 2017.45 arXiv:arXiv:1701.00981v2Google ScholarCross Ref
- Vitalik Buterin. 2014. A next-generation smart contract and decentralized application platform., 36 pages. http://buyxpr.com/build/pdfs/EthereumWhitePaper.pdfGoogle Scholar
- Jan Camenisch and Els Van Herreweghen. 2004. Design and implementation of the idemix anonymous credential system. (2004), 21. https://doi.org/10.1145/586110.586114Google Scholar
- David Chaum, Claude Crepeau, and Ivan Damgard. 1988. Multiparty Unconditionally Secure Protocols. In Proceedings of the twentieth annual ACM symposium on Theory of computing. ACM, Chicago, Illinois, USA, 11--19. http://crypto.cs.mcgill.ca/{~}crepeau/PDF/ASPUBLISHED/CCD88A.pdfGoogle ScholarDigital Library
- European Court of Justice. 2014. EUR-Lex - 62012CJ0131 - EN - EUR-Lex. Technical Report. https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX{%}3A62012CJ0131Google Scholar
- Christopher Ferris. 2019. Does Hyperledger Fabric perform at scale? -Blockchain Pulse: IBM Blockchain Blog. https://www.ibm.com/blogs/blockchain/2019/04/does-hyperledger-fabric-perform-at-scale/Google Scholar
- Craig Gentry. 2010. Computing arbitrary functions of encrypted data. Commun. ACM 53, 3 (2010), 97. https://doi.org/10.1145/1666420.1666444Google ScholarDigital Library
- Shafi Goldwasser, Silvio Micali, and Charles Rackoff. 1989. The Knowledge Complexity of Interactive Proof Systems. Technical Report 1. 186--208 pages. http://crypto.cs.mcgill.ca/{~}crepeau/COMP647/2007/TOPIC01/GMR89.pdfGoogle Scholar
- Mike Hearn. 2016. Corda: A distributed ledger. Technical Report.Google Scholar
- JP Morgan Chase. 2016. Quorum Whitepaper. Technical Report. JP Morgan Chase. https://github.com/jpmorganchase/quorum-docs/ blob/master/QuorumWhitepaperv0.1.pdfGoogle Scholar
- Kristin Lauter, Michael Naehrig, and Vinod Vaikuntanathan. 2011. Can homomorphic encryption be practical? Proceedings of the ACM Conference on Computer and Communications Security (2011), 113--124. https://doi.org/10.1145/2046660.2046682Google Scholar
- R3 Limited. 2019. SGX Integration. https://docs.corda.net/head/design/sgx-integration/design.htmlGoogle Scholar
- Linux Foundation. 2018. [FAB-106] ledger checkpoint and pruning/archiving - Hyperledger JIRA. https://jira.hyperledger.org/browse/FAB-106Google Scholar
- Ralph C Merkle. 1982. Method of Providing Digital Signatures., 5 pages. https://patentimages.storage.googleapis.com/69/ab/d9/2ff9f94fada6ea/US4309569.pdfGoogle Scholar
- Eduardo Morais, Tommy Koens, Cees Van Wijk, and Aleksei Koren. 2018. A Survey on Zero Knowledge Range Proofs and Applications. Technical Report. 1--33 pages. arXiv:1907.06381v1 https://arxiv.org/pdf/1907.06381.pdfGoogle Scholar
- Satoshi Nakamoto. 2008. Bitcoin: A Peer-to-Peer Electronic Cash System. Technical Report. www.bitcoin.orgGoogle Scholar
- NIST. 2001. Announcing the ADVANCED ENCRYPTION STANDARD (AES). US Department of Commerce, National Institute of Standards and Technology 56 (2001), 57--71. https://doi.org/10.6028/NIST.FIPS.197Google Scholar
- Ronald L Rivest, Adi Shamir, and Leonard Adleman. 1978. A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Commun. ACM 21, 2 (1978), 120--126.Google ScholarDigital Library
Index Terms
- Designing for Privacy and Confidentiality on Distributed Ledgers for Enterprise (Industry Track)
Recommendations
Virtual private ledgers: embedding private distributed ledgers over a public blockchain by cryptography
IDEAS '19: Proceedings of the 23rd International Database Applications & Engineering SymposiumDistributed ledgers allow us to replicate databases of records across mutually untrusted parties. The best known example of distributed ledger is perhaps the Bitcoin blockchain, which maintains a consistent history of financial transactions organized as ...
Privacy-enhancing distributed protocol for data aggregation based on blockchain and homomorphic encryption
Highlights- Blockchain and Homomorphic Encryption combination for privacy enhancement.
- ...
AbstractThe recent increase in reported incidents of security breaches compromising users' privacy call into question the current centralized model in which third-parties collect and control massive amounts of personal data. Blockchain has ...
Comments